+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:06 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:06 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.3qEp7AjG1e
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.3qEp7AjG1e /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.vkYzBBpFyJ
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.vkYzBBpFyJ /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:06 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:06 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.1390
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.1390
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.1390
+ cp -f /host/usr/bin/opensdn-status.tmp.1390 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.1390 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.1390
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:06 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:06 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.21252
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.21252
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.21252
+ cp -f /host/usr/bin/opensdn-tools.tmp.21252 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.21252 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.21252
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:06 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:06 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:06 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:06 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ grep 'inet '
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:06 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:06 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:08 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:08 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.xrhihjRSLh
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.xrhihjRSLh /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.79u42u8TFl
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.79u42u8TFl /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:08 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:08 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.30762
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.30762
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.30762
+ cp -f /host/usr/bin/opensdn-status.tmp.30762 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.30762 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.30762
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:08 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:08 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.28821
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.28821
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.28821
+ cp -f /host/usr/bin/opensdn-tools.tmp.28821 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.28821 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.28821
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:08 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:08 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ grep 'inet '
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:08 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:08 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:08 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:08 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:10 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:10 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ cut -c1-50
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.VifkP7qZBX
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.VifkP7qZBX /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.QNttcmv0kI
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.QNttcmv0kI /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:10 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:10 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.32695
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.32695
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.32695
+ cp -f /host/usr/bin/opensdn-status.tmp.32695 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.32695 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.32695
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:10 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:10 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.20752
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.20752
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.20752
+ cp -f /host/usr/bin/opensdn-tools.tmp.20752 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.20752 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.20752
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:10 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:10 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:11 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:11 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:11 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:11 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:12 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:12 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.YCh0ib06g1
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.YCh0ib06g1 /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.6ovxwAv0sy
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.6ovxwAv0sy /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:12 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:12 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.20841
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.20841
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.20841
+ cp -f /host/usr/bin/opensdn-status.tmp.20841 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.20841 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.20841
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:12 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:12 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.452
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.452
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.452
+ cp -f /host/usr/bin/opensdn-tools.tmp.452 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.452 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.452
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:13 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:13 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:13 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:13 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:13 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:13 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:40 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:40 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.CfCuGwqCzr
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.CfCuGwqCzr /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.iluGEsscFF
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.iluGEsscFF /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:40 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:40 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.3783
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.3783
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.3783
+ cp -f /host/usr/bin/opensdn-status.tmp.3783 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.3783 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.3783
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:40 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:40 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.18801
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.18801
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.18801
+ cp -f /host/usr/bin/opensdn-tools.tmp.18801 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.18801 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.18801
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:40 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:40 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:40 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:40 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:40 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:40 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:40 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:40 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ cut -d / -f 1
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.hwn37bBFoj
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.hwn37bBFoj /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.cv8E34z6Sk
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.cv8E34z6Sk /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:41 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:41 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.21967
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.21967
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.21967
+ cp -f /host/usr/bin/opensdn-status.tmp.21967 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.21967 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.21967
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:41 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:41 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ grep 'inet '
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.18302
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.18302
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.18302
+ cp -f /host/usr/bin/opensdn-tools.tmp.18302 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.18302 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.18302
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:41 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:41 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:41 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:41 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:41 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:41 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:41 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:41 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.SVDGGDL187
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.SVDGGDL187 /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.IHdXIeAIBH
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.IHdXIeAIBH /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.15405
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.15405
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.15405
+ cp -f /host/usr/bin/opensdn-status.tmp.15405 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.15405 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.15405
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.2348
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.2348
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.2348
+ cp -f /host/usr/bin/opensdn-tools.tmp.2348 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.2348 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.2348
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ date
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ echo 'INFO: =================== Mon Jun  9 01:48:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
+++ cut -d / -f 1
+++ ip addr show dev ens3
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ date
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ echo 'INFO: =================== Mon Jun  9 01:48:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
++++ echo 10.0.0.22
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
++ cut -c1-50
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+ local tmpfile=/etc/sysctl.d/tmp.ZAYiDtz36P
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.ZAYiDtz36P /etc/sysctl.d/60-kernel.core_pattern.conf
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
+ local tmpfile=/tmp/tmp.1QFgXyhiXU
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
net.ipv4.tcp_keepalive_time = 5
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
vm.max_map_count = 128960
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.1QFgXyhiXU /etc/sysctl.d/60-tf-node-init.conf
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ date
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
++ echo 'INFO: =================== Mon Jun  9 01:48:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ ip addr show dev ens3
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
+++ local server_address=10.0.0.22
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++++ echo 10.0.0.22
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++++ echo 10.0.0.22
++ CONFIG_SERVERS=10.0.0.22:8082
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
++++ echo 10.0.0.22
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ CONFIG_SERVERS=10.0.0.22:8082
++++ echo 10.0.0.22
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ local server_address=10.0.0.22
+++ IFS=,
+++ read -ra server_list
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
+++ echo 10.0.0.22:2181
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
+++ local server_typ=KAFKA_NODES
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ get_server_list ANALYTICS ':6379 '
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++++ echo 10.0.0.22
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.6630
+ cat
+ exit
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.6630
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.6630
+ cp -f /host/usr/bin/opensdn-status.tmp.6630 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.6630 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.6630
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.18709
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.18709
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.18709
+ cp -f /host/usr/bin/opensdn-tools.tmp.18709 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.18709 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.18709
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ cut -c1-50
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.DWdV06yZek
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.DWdV06yZek /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.sfUWkgkSeh
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.sfUWkgkSeh /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.2500
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.2500
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.2500
+ cp -f /host/usr/bin/opensdn-status.tmp.2500 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.2500 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.2500
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.21246
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.21246
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.21246
+ cp -f /host/usr/bin/opensdn-tools.tmp.21246 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.21246 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.21246
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:55 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:55 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.6szycZq4jI
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.6szycZq4jI /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.Ow0aq46Tpb
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.Ow0aq46Tpb /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:55 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:55 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.9030
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.9030
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.9030
+ cp -f /host/usr/bin/opensdn-status.tmp.9030 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.9030 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.9030
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:55 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:55 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.8182
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.8182
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.8182
+ cp -f /host/usr/bin/opensdn-tools.tmp.8182 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.8182 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.8182
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:55 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:55 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:55 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:55 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ head -n 1
+++ ip addr show dev ens3
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:55 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:55 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ head -n 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:59 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:59 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.KZyoKhRjlV
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.KZyoKhRjlV /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.dPdpIrkP10
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.dPdpIrkP10 /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:59 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:59 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.11644
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.11644
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.11644
+ cp -f /host/usr/bin/opensdn-status.tmp.11644 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.11644 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.11644
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:48:59 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:48:59 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.7633
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.7633
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.7633
+ cp -f /host/usr/bin/opensdn-tools.tmp.7633 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.7633 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.7633
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:00 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:00 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:00 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:00 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:00 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:00 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:06 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:06 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.4GqdxubvQF
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.4GqdxubvQF /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.uav3zGMmRv
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.uav3zGMmRv /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:06 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:06 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.32297
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.32297
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.32297
+ cp -f /host/usr/bin/opensdn-status.tmp.32297 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.32297 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.32297
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:07 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:07 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.32251
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.32251
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.32251
+ cp -f /host/usr/bin/opensdn-tools.tmp.32251 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.32251 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.32251
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:07 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:07 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ head -n 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:07 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:07 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:07 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:07 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:18 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:18 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.BFij7CfiKW
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.BFij7CfiKW /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.HOZy7FvCQQ
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.HOZy7FvCQQ /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:19 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:19 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.16703
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.16703
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.16703
+ cp -f /host/usr/bin/opensdn-status.tmp.16703 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.16703 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.16703
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:19 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:19 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.15658
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.15658
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.15658
+ cp -f /host/usr/bin/opensdn-tools.tmp.15658 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.15658 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.15658
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:19 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:19 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:19 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:19 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:19 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:19 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
++++ echo 10.0.0.22
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
+++ grep 'inet '
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:19 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:19 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
+++++ ip route get 1
++ mktemp -p /etc/sysctl.d/
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+ local tmpfile=/etc/sysctl.d/tmp.1pfIhEfH7T
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.1pfIhEfH7T /etc/sysctl.d/60-kernel.core_pattern.conf
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+ local tmpfile=/tmp/tmp.jBULxQ2Xd4
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
+++ head -n 1
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
+++ grep 'inet '
+++ ip addr show dev ens3
+++ awk '{print $2}'
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.jBULxQ2Xd4 /etc/sysctl.d/60-tf-node-init.conf
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:20 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:20 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++++ ip route get 1
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+ exit
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.15545
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.15545
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.15545
+ cp -f /host/usr/bin/opensdn-status.tmp.15545 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.15545 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.15545
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:20 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:20 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.7304
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.7304
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.7304
+ cp -f /host/usr/bin/opensdn-tools.tmp.7304 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.7304 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.7304
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:20 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:20 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ cut -d / -f 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:21 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:21 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:21 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:21 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ get_default_ip
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++++ grep -o 'dev.*'
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++++ ip route get 1
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
++++ echo 10.0.0.22
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ CPU_CORE_MASK=0x01
++ RABBITMQ_NODE_PORT=5673
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:21 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:21 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
++ echo kernel.core_pattern
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.PExgIpLqRC
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.PExgIpLqRC /etc/sysctl.d/60-kernel.core_pattern.conf
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.7wJtFC8IjR
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
net.ipv4.tcp_keepalive_time = 5
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
+ shift 2
++ ANALYTICS_SERVERS=10.0.0.22:8081
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.7wJtFC8IjR /etc/sysctl.d/60-tf-node-init.conf
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ date
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ echo 'INFO: =================== Mon Jun  9 01:49:21 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:21 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.19854
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.19854
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.19854
+ cp -f /host/usr/bin/opensdn-status.tmp.19854 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.19854 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.19854
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:21 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:21 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ cut -d / -f 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.12526
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.12526
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.12526
+ cp -f /host/usr/bin/opensdn-tools.tmp.12526 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.12526 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.12526
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:21 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:21 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:21 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:21 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++ date
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
++ echo 'INFO: =================== Mon Jun  9 01:49:21 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:21 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ grep 'inet '
+++ head -n 1
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ get_server_list RABBITMQ :5673,
++++ echo 10.0.0.22
+++ local server_typ=RABBITMQ_NODES
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
+++ local port_with_delim=:5673,
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:21 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:21 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+ local tmpfile=/etc/sysctl.d/tmp.h2fVKk7jTo
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.h2fVKk7jTo /etc/sysctl.d/60-kernel.core_pattern.conf
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ cut -d / -f 1
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.TwGqnKw0ym
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+ sysctl -w net.ipv4.tcp_keepalive_time=5
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
net.core.wmem_max = 9160000
+++ IFS=,
+++ read -ra server_list
+ shift 2
+ true
+ local var=
+++ local extended_server_list=
+ local value=
+ '[' -n '' ']'
+ break
+++ for server in '"${server_list[@]}"'
+ mv -f /tmp/tmp.TwGqnKw0ym /etc/sysctl.d/60-tf-node-init.conf
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:22 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:22 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++++ grep -o 'dev.*'
++++ echo 10.0.0.22
+++++ awk '{print $2}'
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ echo 10.0.0.22:2181
+++ cut -d / -f 1
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ get_cidr_for_nic ens3
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ BGP_ASN=64512
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.6492
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.6492
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.6492
+ cp -f /host/usr/bin/opensdn-status.tmp.6492 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.6492 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.6492
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:22 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:22 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.14033
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.14033
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.14033
+ cp -f /host/usr/bin/opensdn-tools.tmp.14033 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.14033 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.14033
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:22 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:22 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:22 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:22 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:49:22 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:49:22 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:06 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:06 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.yXx2tASOju
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.yXx2tASOju /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.EKticp2Qrl
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.EKticp2Qrl /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:06 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:06 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.15096
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.15096
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.15096
+ cp -f /host/usr/bin/opensdn-status.tmp.15096 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.15096 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.15096
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:06 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:06 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.15663
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.15663
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.15663
+ cp -f /host/usr/bin/opensdn-tools.tmp.15663 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.15663 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.15663
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:06 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:06 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:06 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:06 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:06 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:06 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:06 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:06 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.HAN4lYaJWG
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.HAN4lYaJWG /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.eYixeBl35b
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.eYixeBl35b /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:06 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:06 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ cut -d / -f 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.6562
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.6562
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.6562
+ cp -f /host/usr/bin/opensdn-status.tmp.6562 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.6562 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.6562
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:06 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:06 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ cut -d / -f 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.45
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.45
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.45
+ cp -f /host/usr/bin/opensdn-tools.tmp.45 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.45 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.45
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:07 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:07 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:07 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:07 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:07 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:07 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:07 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:07 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.U3vvb1Z2xi
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.U3vvb1Z2xi /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.IQpgX5JFps
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.IQpgX5JFps /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:07 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:07 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.729
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.729
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.729
+ cp -f /host/usr/bin/opensdn-status.tmp.729 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.729 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.729
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:07 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:07 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.12050
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.12050
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.12050
+ cp -f /host/usr/bin/opensdn-tools.tmp.12050 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.12050 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.12050
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:07 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:07 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:07 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:07 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:07 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:07 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:10 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:10 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.4cBXD7ZjcR
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.4cBXD7ZjcR /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.ZucMOoSpFc
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.ZucMOoSpFc /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:10 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:10 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.16529
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.16529
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.16529
+ cp -f /host/usr/bin/opensdn-status.tmp.16529 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.16529 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.16529
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:10 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:10 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.31098
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.31098
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.31098
+ cp -f /host/usr/bin/opensdn-tools.tmp.31098 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.31098 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.31098
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:10 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:10 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ head -n 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:10 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:10 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:10 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:10 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:23 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:23 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ grep 'inet '
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.jJ1eKpNnQn
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.jJ1eKpNnQn /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.yGShvJ6UFH
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.yGShvJ6UFH /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.14191
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.14191
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.14191
+ cp -f /host/usr/bin/opensdn-status.tmp.14191 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.14191 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.14191
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.7937
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.7937
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.7937
+ cp -f /host/usr/bin/opensdn-tools.tmp.7937 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.7937 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.7937
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
+++ date
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
++ echo 'INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.IkCWqeccM2
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.IkCWqeccM2 /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.dumzG2QMwd
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.dumzG2QMwd /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.21014
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.21014
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.21014
+ cp -f /host/usr/bin/opensdn-status.tmp.21014 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.21014 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.21014
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.16752
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.16752
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.16752
+ cp -f /host/usr/bin/opensdn-tools.tmp.16752 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.16752 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.16752
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ cut -d / -f 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:24 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ cut -c1-50
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.ZnerZnJgID
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.ZnerZnJgID /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.GigffAeB85
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.GigffAeB85 /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.21537
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.21537
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.21537
+ cp -f /host/usr/bin/opensdn-status.tmp.21537 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.21537 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.21537
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.22698
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.22698
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.22698
+ cp -f /host/usr/bin/opensdn-tools.tmp.22698 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.22698 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.22698
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.HA1CinpChp
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.HA1CinpChp /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.JSZaDBqkLZ
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.JSZaDBqkLZ /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.26248
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.26248
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.26248
+ cp -f /host/usr/bin/opensdn-status.tmp.26248 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.26248 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.26248
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:36 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:36 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.13403
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.13403
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.13403
+ cp -f /host/usr/bin/opensdn-tools.tmp.13403 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.13403 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.13403
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:36 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:36 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:36 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:36 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ grep 'inet '
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:51:36 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:51:36 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:28 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:28 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.oZpsxI7m3z
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.oZpsxI7m3z /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.8T8nq6Zfim
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.8T8nq6Zfim /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:28 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:28 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.11814
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.11814
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.11814
+ cp -f /host/usr/bin/opensdn-status.tmp.11814 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.11814 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.11814
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:28 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:28 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.1751
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.1751
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.1751
+ cp -f /host/usr/bin/opensdn-tools.tmp.1751 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.1751 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.1751
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:28 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:28 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:28 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:28 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:28 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:28 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:31 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:31 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.vRlYX5blrr
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.vRlYX5blrr /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.ECRK7Z6rxL
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.ECRK7Z6rxL /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:31 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:31 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.5252
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.5252
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.5252
+ cp -f /host/usr/bin/opensdn-status.tmp.5252 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.5252 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.5252
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:31 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:31 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.13589
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.13589
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.13589
+ cp -f /host/usr/bin/opensdn-tools.tmp.13589 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.13589 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.13589
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:31 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:31 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.rNMXcPw1le
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.rNMXcPw1le /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.Tqrldll8FZ
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.Tqrldll8FZ /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.6958
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.6958
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.6958
+ cp -f /host/usr/bin/opensdn-status.tmp.6958 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.6958 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.6958
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.7468
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.7468
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.7468
+ cp -f /host/usr/bin/opensdn-tools.tmp.7468 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.7468 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.7468
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.Y3hmLKALah
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.Y3hmLKALah /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.j6UJbRFlRn
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.j6UJbRFlRn /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.19180
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.19180
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.19180
+ cp -f /host/usr/bin/opensdn-status.tmp.19180 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.19180 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.19180
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.6805
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.6805
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.6805
+ cp -f /host/usr/bin/opensdn-tools.tmp.6805 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.6805 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.6805
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++ date
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ grep 'inet '
++ echo 'INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++ awk '{print $2}'
+++++ ip route get 1
+++ head -n 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ head -n 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ local extended_server_list=
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
+++ for server in '"${server_list[@]}"'
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++++ echo 10.0.0.22
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++++ echo 10.0.0.22
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
+++ local server_address=10.0.0.22
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
+++ echo 10.0.0.22:9041
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ get_server_list ANALYTICS ':6379 '
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
++++ echo 10.0.0.22
+++ for server in '"${server_list[@]}"'
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
++ echo kernel.core_pattern
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.dTu2eF6mTz
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.dTu2eF6mTz /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.YDjACO1yyz
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.YDjACO1yyz /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.19125
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.19125
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.19125
+ cp -f /host/usr/bin/opensdn-status.tmp.19125 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.19125 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.19125
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:32 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.29285
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.29285
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.29285
+ cp -f /host/usr/bin/opensdn-tools.tmp.29285 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.29285 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.29285
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:33 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:33 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:33 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:33 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:33 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:33 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:37 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:37 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.R5AvKdAxrC
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.R5AvKdAxrC /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.EP3PZ8D3f0
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.EP3PZ8D3f0 /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:37 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:37 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.10355
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.10355
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.10355
+ cp -f /host/usr/bin/opensdn-status.tmp.10355 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.10355 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.10355
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:38 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:38 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.24517
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.24517
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.24517
+ cp -f /host/usr/bin/opensdn-tools.tmp.24517 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.24517 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.24517
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:38 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:38 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:38 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:38 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:38 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:38 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
++++ echo 10.0.0.22
+++ echo 10.0.0.22:9042
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
+++ local server_address=10.0.0.22
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++++ echo 10.0.0.22
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++++ echo 10.0.0.22
++ true
++ read -r -d '' rabbit_config
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.OwTBAKp726
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.OwTBAKp726 /etc/sysctl.d/60-kernel.core_pattern.conf
+++ date
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ echo 'INFO: =================== Mon Jun  9 01:52:38 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:38 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
++ mktemp -u
+++ get_default_ip
+ local tmpfile=/tmp/tmp.oDxQkVuM0U
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.oDxQkVuM0U /etc/sysctl.d/60-tf-node-init.conf
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++ date
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
++ echo 'INFO: =================== Mon Jun  9 01:52:38 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:38 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ head -n 1
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
+++ ip addr show dev ens3
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
++++ echo 10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ CONFIGDB_SERVERS=10.0.0.22:9161
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.15981
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.15981
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.15981
+ cp -f /host/usr/bin/opensdn-status.tmp.15981 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.15981 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.15981
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:38 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:38 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.24720
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.24720
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.24720
+ cp -f /host/usr/bin/opensdn-tools.tmp.24720 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.24720 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.24720
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:38 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:38 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ date
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ echo 'INFO: =================== Mon Jun  9 01:52:38 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:38 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
+++ command -v ip
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+++ grep 'inet '
+++ ip addr show dev ens3
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:38 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:38 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ local nic=ens3
+++ get_ip_for_nic ens3
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
+++ local nic=ens3
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.nWJyZtvpQf
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
++++ echo 10.0.0.22
+ mv -f /etc/sysctl.d/tmp.nWJyZtvpQf /etc/sysctl.d/60-kernel.core_pattern.conf
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
+++ IFS=,
+++ read -ra server_list
++ mktemp -u
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+ local tmpfile=/tmp/tmp.FcGW19TOlL
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
net.ipv4.tcp_keepalive_probes = 5
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
vm.max_map_count = 128960
+++ IFS=,
+++ read -ra server_list
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
net.core.wmem_max = 9160000
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
+ shift 2
+ true
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.FcGW19TOlL /etc/sysctl.d/60-tf-node-init.conf
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ date
+++ echo 10.0.0.22:9092
++ echo 'INFO: =================== Mon Jun  9 01:52:39 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:39 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:39 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:39 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
+++ local extended_server_list=
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ for server in '"${server_list[@]}"'
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
+++ echo 10.0.0.22:9042
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
++++ echo 10.0.0.22
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++++ echo 10.0.0.22
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
++ '[' -n '' ']'
+++ echo 10.0.0.22:9161
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
+++ IFS=,
+++ read -ra server_list
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++++ echo 10.0.0.22
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
+++ echo 10.0.0.22:9041
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.4175
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.4175
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.4175
+ cp -f /host/usr/bin/opensdn-status.tmp.4175 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.4175 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.4175
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:39 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:39 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.25448
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.25448
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.25448
+ cp -f /host/usr/bin/opensdn-tools.tmp.25448 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.25448 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.25448
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:39 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:39 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:39 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:39 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:39 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:39 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.xDxNUnJHiq
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.xDxNUnJHiq /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.KRWPATwhoW
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.KRWPATwhoW /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.26069
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.26069
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.26069
+ cp -f /host/usr/bin/opensdn-status.tmp.26069 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.26069 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.26069
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.8463
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.8463
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.8463
+ cp -f /host/usr/bin/opensdn-tools.tmp.8463 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.8463 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.8463
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:44 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:44 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.jQKKBaaMmp
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.jQKKBaaMmp /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.1mQ0Z2B3NO
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.1mQ0Z2B3NO /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.25675
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.25675
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.25675
+ cp -f /host/usr/bin/opensdn-status.tmp.25675 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.25675 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.25675
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.21132
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.21132
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.21132
+ cp -f /host/usr/bin/opensdn-tools.tmp.21132 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.21132 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.21132
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ cut -d / -f 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:52:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:52:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.IKsQjukBjB
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.IKsQjukBjB /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.qmNZ2lqUa0
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.qmNZ2lqUa0 /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.12105
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.12105
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.12105
+ cp -f /host/usr/bin/opensdn-status.tmp.12105 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.12105 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.12105
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.133
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.133
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.133
+ cp -f /host/usr/bin/opensdn-tools.tmp.133 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.133 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.133
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ cut -d / -f 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.sSfWSCtGfY
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.sSfWSCtGfY /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.lU6MGFFwvX
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.lU6MGFFwvX /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.25442
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.25442
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.25442
+ cp -f /host/usr/bin/opensdn-status.tmp.25442 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.25442 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.25442
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ cut -d / -f 1
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.13888
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.13888
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.13888
+ cp -f /host/usr/bin/opensdn-tools.tmp.13888 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.13888 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.13888
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ head -n 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.egApA2ND1N
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.egApA2ND1N /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.zwDmfVg8ow
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.zwDmfVg8ow /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.11098
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.11098
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.11098
+ cp -f /host/usr/bin/opensdn-status.tmp.11098 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.11098 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.11098
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.7437
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.7437
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.7437
+ cp -f /host/usr/bin/opensdn-tools.tmp.7437 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.7437 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.7437
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:36 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:39 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:39 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.tZFd7GogxW
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.tZFd7GogxW /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.ohsJL47eID
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.ohsJL47eID /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:39 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:39 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.28914
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.28914
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.28914
+ cp -f /host/usr/bin/opensdn-status.tmp.28914 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.28914 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.28914
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:39 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:39 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.24633
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.24633
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.24633
+ cp -f /host/usr/bin/opensdn-tools.tmp.24633 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.24633 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.24633
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:39 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:39 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:39 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:39 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ cut -d / -f 1
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:39 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:39 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.wuXS2RfA2A
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.wuXS2RfA2A /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.LSYaaFH53o
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.LSYaaFH53o /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.3099
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.3099
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.3099
+ cp -f /host/usr/bin/opensdn-status.tmp.3099 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.3099 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.3099
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.16873
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.16873
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.16873
+ cp -f /host/usr/bin/opensdn-tools.tmp.16873 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.16873 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.16873
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ grep 'inet '
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.y0p6xzDINp
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.y0p6xzDINp /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.euXlYW2aLo
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.euXlYW2aLo /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.1622
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.1622
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.1622
+ cp -f /host/usr/bin/opensdn-status.tmp.1622 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.1622 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.1622
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ head -n 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.20672
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.20672
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.20672
+ cp -f /host/usr/bin/opensdn-tools.tmp.20672 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.20672 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.20672
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ date
+++ local server_address=10.0.0.22
++ echo 'INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ head -n 1
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ INTROSPECT_LISTEN_ALL=True
++ CONTROLLER_NODES=10.0.0.22
++ SANDESH_SSL_ENABLE=False
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+ exit
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.JxQ9DcpEUA
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.JxQ9DcpEUA /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.IXYrRaX3At
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.IXYrRaX3At /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.64
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.64
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.64
+ cp -f /host/usr/bin/opensdn-status.tmp.64 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.64 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.64
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.32278
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.32278
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.32278
+ cp -f /host/usr/bin/opensdn-tools.tmp.32278 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.32278 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.32278
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.G9SgUUCcbA
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.G9SgUUCcbA /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.ccrNBPUqzk
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.ccrNBPUqzk /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.5624
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.5624
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.5624
+ cp -f /host/usr/bin/opensdn-status.tmp.5624 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.5624 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.5624
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
+++ cut -d / -f 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.5537
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.5537
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.5537
+ cp -f /host/usr/bin/opensdn-tools.tmp.5537 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.5537 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.5537
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:55:43 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ head -n 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:57:36 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:57:36 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.DZtzWjvN35
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.DZtzWjvN35 /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.7pGCvD1jCh
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.7pGCvD1jCh /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:57:36 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:57:36 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.22658
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.22658
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.22658
+ cp -f /host/usr/bin/opensdn-status.tmp.22658 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.22658 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.22658
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:57:36 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:57:36 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.161
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.161
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.161
+ cp -f /host/usr/bin/opensdn-tools.tmp.161 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.161 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.161
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:57:37 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:57:37 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:57:37 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:57:37 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:57:37 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:57:37 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.ETycnV0Ihz
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.ETycnV0Ihz /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.weAy5icpVA
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.weAy5icpVA /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.28140
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.28140
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.28140
+ cp -f /host/usr/bin/opensdn-status.tmp.28140 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.28140 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.28140
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.1647
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.1647
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.1647
+ cp -f /host/usr/bin/opensdn-tools.tmp.1647 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.1647 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.1647
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ grep 'inet '
+++ echo 10.0.0.22:2181
+++ awk '{print $2}'
+++ head -n 1
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
+++ local server_address=10.0.0.22
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
+++ extended_server_list+='10.0.0.22:9092 '
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
+++ local server_typ=ANALYTICS_NODES
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
+++ local 'port_with_delim=:8081 '
++ KEYSTONE_AUTH_ADMIN_PORT=5000
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
+++ local extended_server_list=
++ KEYSTONE_AUTH_CERTFILE=
+++ for server in '"${server_list[@]}"'
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++++ echo 10.0.0.22
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+ exit
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.fgDCRf6qmj
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.fgDCRf6qmj /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.J4unFPRg1J
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.J4unFPRg1J /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.29915
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.29915
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.29915
+ cp -f /host/usr/bin/opensdn-status.tmp.29915 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.29915 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.29915
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.8583
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.8583
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.8583
+ cp -f /host/usr/bin/opensdn-tools.tmp.8583 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.8583 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.8583
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
+++ date
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ echo 'INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:41 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ echo 10.0.0.22
++++ command -v ip
++++ local ip=1
+++ local server_address=10.0.0.22
+++++ ip route get 1
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
+++++ grep -o 'dev.*'
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++++ awk '{print $2}'
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
+++ awk '{print $2}'
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ grep 'inet '
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
+++ ip addr show dev ens3
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.3GOiOxCGw3
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.3GOiOxCGw3 /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.glNWkMMPp4
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.glNWkMMPp4 /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.18749
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.18749
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.18749
+ cp -f /host/usr/bin/opensdn-status.tmp.18749 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.18749 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.18749
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ cut -d / -f 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.14938
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.14938
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.14938
+ cp -f /host/usr/bin/opensdn-tools.tmp.14938 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.14938 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.14938
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:42 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:42 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:44 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:44 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.2wCcYTtAe6
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.2wCcYTtAe6 /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.44gRSbtl9y
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.44gRSbtl9y /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:44 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:44 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.27485
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.27485
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.27485
+ cp -f /host/usr/bin/opensdn-status.tmp.27485 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.27485 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.27485
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:45 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:45 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ cut -d / -f 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.23178
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.23178
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.23178
+ cp -f /host/usr/bin/opensdn-tools.tmp.23178 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.23178 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.23178
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:45 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:45 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:45 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:45 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:45 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:45 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.2cE344E2K6
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.2cE344E2K6 /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.NACAFRc1CC
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.NACAFRc1CC /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ cut -d / -f 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.7326
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.7326
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.7326
+ cp -f /host/usr/bin/opensdn-status.tmp.7326 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.7326 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.7326
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.4076
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.4076
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.4076
+ cp -f /host/usr/bin/opensdn-tools.tmp.4076 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.4076 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.4076
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ head -n 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.ke6i585N9U
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.ke6i585N9U /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.pl6pIsytl1
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.pl6pIsytl1 /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.8899
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.8899
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.8899
+ cp -f /host/usr/bin/opensdn-status.tmp.8899 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.8899 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.8899
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.27558
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.27558
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.27558
+ cp -f /host/usr/bin/opensdn-tools.tmp.27558 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.27558 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.27558
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.6VY2FKUFff
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.6VY2FKUFff /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.ktu2lVq0EJ
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.ktu2lVq0EJ /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.25822
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.25822
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.25822
+ cp -f /host/usr/bin/opensdn-status.tmp.25822 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.25822 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.25822
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.5762
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.5762
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.5762
+ cp -f /host/usr/bin/opensdn-tools.tmp.5762 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.5762 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.5762
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ cut -d / -f 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:49 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:49 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.XbdELTAMmO
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.XbdELTAMmO /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.VMSFwPmpKH
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.VMSFwPmpKH /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:49 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:49 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.13435
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.13435
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.13435
+ cp -f /host/usr/bin/opensdn-status.tmp.13435 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.13435 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.13435
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:49 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:49 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.17211
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.17211
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.17211
+ cp -f /host/usr/bin/opensdn-tools.tmp.17211 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.17211 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.17211
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:49 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:49 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:49 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:49 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ cut -d / -f 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 01:59:49 UTC 2025 ==================='
INFO: =================== Mon Jun  9 01:59:49 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:03:34 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:03:34 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.3TZ1IX0nlA
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.3TZ1IX0nlA /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.74XD81o8E0
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.74XD81o8E0 /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:03:34 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:03:34 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.12700
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.12700
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.12700
+ cp -f /host/usr/bin/opensdn-status.tmp.12700 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.12700 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.12700
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:03:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:03:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.8571
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.8571
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.8571
+ cp -f /host/usr/bin/opensdn-tools.tmp.8571 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.8571 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.8571
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:03:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:03:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
+++ head -n 1
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:03:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:03:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:03:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:03:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.zeuywArLFE
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.zeuywArLFE /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.1ikcrHyWQm
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.1ikcrHyWQm /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.19021
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.19021
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.19021
+ cp -f /host/usr/bin/opensdn-status.tmp.19021 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.19021 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.19021
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.12460
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.12460
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.12460
+ cp -f /host/usr/bin/opensdn-tools.tmp.12460 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.12460 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.12460
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ cut -d / -f 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ date
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ echo 'INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ local ip=1
++++ echo 10.0.0.22
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
+++ cut -d / -f 1
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_cidr_for_nic ens3
+++ get_server_list ZOOKEEPER :2181,
+++ command -v ip
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local nic=ens3
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ awk '{print $2}'
+++ head -n 1
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ grep 'inet '
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ ip addr show dev ens3
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
++ DEFAULT_LOCAL_IP=10.0.0.22
+++ for server in '"${server_list[@]}"'
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++++ echo 10.0.0.22
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ for server in '"${server_list[@]}"'
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++++ echo 10.0.0.22
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.ynckyR4SCl
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.ynckyR4SCl /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.UzPq0cCPyz
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.UzPq0cCPyz /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.2579
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.2579
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.2579
+ cp -f /host/usr/bin/opensdn-status.tmp.2579 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.2579 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.2579
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.16885
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.16885
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.16885
+ cp -f /host/usr/bin/opensdn-tools.tmp.16885 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.16885 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.16885
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:47 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.TzWBbLSJmx
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.TzWBbLSJmx /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.axgXNoJUXM
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.axgXNoJUXM /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.27644
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.27644
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.27644
+ cp -f /host/usr/bin/opensdn-status.tmp.27644 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.27644 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.27644
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.1408
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.1408
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.1408
+ cp -f /host/usr/bin/opensdn-tools.tmp.1408 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.1408 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.1408
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:48 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:48 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:50 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:50 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.MgqR7iqDHy
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.MgqR7iqDHy /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.cvjTTW3HHN
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.cvjTTW3HHN /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:50 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:50 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.714
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.714
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.714
+ cp -f /host/usr/bin/opensdn-status.tmp.714 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.714 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.714
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:50 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:50 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.15432
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.15432
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.15432
+ cp -f /host/usr/bin/opensdn-tools.tmp.15432 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.15432 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.15432
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:50 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:50 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:50 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:50 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:51 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:51 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:53 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:53 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.tZ1ne88qjT
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.tZ1ne88qjT /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.LkDhGuSlrH
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.LkDhGuSlrH /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:53 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:53 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.29337
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.29337
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.29337
+ cp -f /host/usr/bin/opensdn-status.tmp.29337 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.29337 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.29337
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:53 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:53 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.30419
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.30419
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.30419
+ cp -f /host/usr/bin/opensdn-tools.tmp.30419 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.30419 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.30419
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:53 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:53 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:53 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:53 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:53 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:53 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:53 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:53 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.3X0QuQ0vRV
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.3X0QuQ0vRV /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.tAgAsDxfy2
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.tAgAsDxfy2 /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:53 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:53 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.10508
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.10508
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.10508
+ cp -f /host/usr/bin/opensdn-status.tmp.10508 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.10508 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.10508
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:53 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:53 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.14734
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.14734
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.14734
+ cp -f /host/usr/bin/opensdn-tools.tmp.14734 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.14734 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.14734
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
+++ cut -d / -f 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.kjybREcR7F
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.kjybREcR7F /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.4x8jNOYfGw
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.4x8jNOYfGw /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ cut -d / -f 1
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.12214
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.12214
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.12214
+ cp -f /host/usr/bin/opensdn-status.tmp.12214 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.12214 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.12214
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.535
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.535
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.535
+ cp -f /host/usr/bin/opensdn-tools.tmp.535 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.535 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.535
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ grep 'inet '
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.lOO1uuHweu
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.lOO1uuHweu /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.UqRaa2T1RZ
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.UqRaa2T1RZ /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.8644
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.8644
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.8644
+ cp -f /host/usr/bin/opensdn-status.tmp.8644 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.8644 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.8644
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.23810
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.23810
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.23810
+ cp -f /host/usr/bin/opensdn-tools.tmp.23810 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.23810 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.23810
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:04:54 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:01 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:01 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.WG8iYCseOg
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.WG8iYCseOg /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.ijWhvkXrGZ
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.ijWhvkXrGZ /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:01 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:01 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.1517
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.1517
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.1517
+ cp -f /host/usr/bin/opensdn-status.tmp.1517 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.1517 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.1517
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:01 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:01 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.19710
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.19710
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.19710
+ cp -f /host/usr/bin/opensdn-tools.tmp.19710 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.19710 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.19710
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:01 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:01 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:01 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:01 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ grep 'inet '
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:01 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:01 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:01 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:01 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.PQ1qB4xtYH
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.PQ1qB4xtYH /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.J0zV8Z14jF
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.J0zV8Z14jF /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:01 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:01 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ cut -d / -f 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.23251
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.23251
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.23251
+ cp -f /host/usr/bin/opensdn-status.tmp.23251 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.23251 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.23251
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:02 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:02 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.20978
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.20978
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.20978
+ cp -f /host/usr/bin/opensdn-tools.tmp.20978 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.20978 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.20978
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:02 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:02 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:02 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:02 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:02 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:02 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:12 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:12 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.3lF5WvWqvi
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.3lF5WvWqvi /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.bNHYOYY35x
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.bNHYOYY35x /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:12 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:12 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.21455
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.21455
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.21455
+ cp -f /host/usr/bin/opensdn-status.tmp.21455 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.21455 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.21455
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:12 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:12 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.29148
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.29148
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.29148
+ cp -f /host/usr/bin/opensdn-tools.tmp.29148 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.29148 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.29148
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:13 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:13 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:13 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:13 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:13 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:13 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ command -v ip
+++ local nic=ens3
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++++ echo 10.0.0.22
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ ANALYTICS_SERVERS=10.0.0.22:8081
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
+++ IFS=,
+++ read -ra server_list
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
+++ local extended_server_list=
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
+++ for server in '"${server_list[@]}"'
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ cut -c1-50
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.zVfkiQ3xh1
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.zVfkiQ3xh1 /etc/sysctl.d/60-kernel.core_pattern.conf
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ mktemp -u
+ local tmpfile=/tmp/tmp.MEHw46X4jQ
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
net.ipv4.tcp_keepalive_time = 5
++ CONFIG_SERVERS=10.0.0.22:8082
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
net.ipv4.tcp_keepalive_probes = 5
++ CONFIGDB_SERVERS=10.0.0.22:9161
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
net.core.wmem_max = 9160000
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.MEHw46X4jQ /etc/sysctl.d/60-tf-node-init.conf
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ date
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
++ echo 'INFO: =================== Mon Jun  9 02:09:13 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:13 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
+++ head -n 1
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:13 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:13 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ head -n 1
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ get_server_list CONFIGDB ':9041 '
++++ echo 10.0.0.22
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.11541
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.11541
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.11541
+ cp -f /host/usr/bin/opensdn-status.tmp.11541 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.11541 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.11541
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:13 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:13 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.11618
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.11618
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.11618
+ cp -f /host/usr/bin/opensdn-tools.tmp.11618 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.11618 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.11618
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:13 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:13 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:13 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:13 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:13 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:13 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:17 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:17 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.oeLHrnOPgD
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.oeLHrnOPgD /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.w4En655NVq
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.w4En655NVq /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:17 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:17 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.6090
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.6090
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.6090
+ cp -f /host/usr/bin/opensdn-status.tmp.6090 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.6090 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.6090
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:17 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:17 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.21810
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.21810
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.21810
+ cp -f /host/usr/bin/opensdn-tools.tmp.21810 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.21810 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.21810
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:17 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:17 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.35zd7EXYPe
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.35zd7EXYPe /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.k8CXeiGqU0
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.k8CXeiGqU0 /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.5026
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.5026
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.5026
+ cp -f /host/usr/bin/opensdn-status.tmp.5026 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.5026 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.5026
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ head -n 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.16947
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.16947
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.16947
+ cp -f /host/usr/bin/opensdn-tools.tmp.16947 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.16947 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.16947
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ cut -d / -f 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.KLyQeKcNcB
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.KLyQeKcNcB /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.KweRjMX7M6
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.KweRjMX7M6 /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.9058
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.9058
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.9058
+ cp -f /host/usr/bin/opensdn-status.tmp.9058 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.9058 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.9058
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.3611
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.3611
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.3611
+ cp -f /host/usr/bin/opensdn-tools.tmp.3611 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.3611 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.3611
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:18 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ grep 'inet '
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:21 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:21 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.trCb8Nhgo9
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.trCb8Nhgo9 /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.LWZCskRrvr
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.LWZCskRrvr /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:21 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:21 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.18320
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.18320
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.18320
+ cp -f /host/usr/bin/opensdn-status.tmp.18320 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.18320 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.18320
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:21 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:21 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.23503
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.23503
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.23503
+ cp -f /host/usr/bin/opensdn-tools.tmp.23503 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.23503 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.23503
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:21 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:21 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:21 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:21 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:21 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:21 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:34 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:34 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.XusQQj63Au
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.XusQQj63Au /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.MIx0R4RZ6i
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.MIx0R4RZ6i /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:34 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:34 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.10550
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.10550
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.10550
+ cp -f /host/usr/bin/opensdn-status.tmp.10550 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.10550 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.10550
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:34 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:34 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.31430
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.31430
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.31430
+ cp -f /host/usr/bin/opensdn-tools.tmp.31430 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.31430 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.31430
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:34 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:34 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ cut -d / -f 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:34 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:34 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
+++ date
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
++ echo 'INFO: =================== Mon Jun  9 02:09:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
+++ date
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++ echo 'INFO: =================== Mon Jun  9 02:09:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++++ grep -o 'dev.*'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++++ local iface=ens3
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++++ [[ ens3 == \l\o ]]
++++ echo ens3
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
++++ echo 10.0.0.22
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ local server_typ=CONFIG_NODES
+++ IFS=,
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ read -ra server_list
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
++++ echo 10.0.0.22
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++++ echo 10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_typ=KAFKA_NODES
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.ogzg7QFBxV
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.ogzg7QFBxV /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.RoOOi8krpl
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.RoOOi8krpl /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.23286
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.23286
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.23286
+ cp -f /host/usr/bin/opensdn-status.tmp.23286 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.23286 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.23286
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.23705
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.23705
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.23705
+ cp -f /host/usr/bin/opensdn-tools.tmp.23705 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.23705 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.23705
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:35 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:35 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:45 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:45 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.f7xSsvwiTq
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.f7xSsvwiTq /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.pmp4tQLBj4
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.pmp4tQLBj4 /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:45 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:45 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.12553
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.12553
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.12553
+ cp -f /host/usr/bin/opensdn-status.tmp.12553 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.12553 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.12553
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:46 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:46 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.12797
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.12797
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.12797
+ cp -f /host/usr/bin/opensdn-tools.tmp.12797 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.12797 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.12797
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:46 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:46 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:46 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:46 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:46 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:46 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:46 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:46 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.5sjq8Nhyn8
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.5sjq8Nhyn8 /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.6bqSQ8g1B7
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.6bqSQ8g1B7 /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:46 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:46 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.9803
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.9803
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.9803
+ cp -f /host/usr/bin/opensdn-status.tmp.9803 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.9803 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.9803
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:46 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:46 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.26664
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.26664
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.26664
+ cp -f /host/usr/bin/opensdn-tools.tmp.26664 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.26664 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.26664
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:46 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:46 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ cut -d / -f 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:46 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:46 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:46 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:46 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:49 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:49 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.y8DS7wygp8
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.y8DS7wygp8 /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.vWApChO8nO
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.vWApChO8nO /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:49 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:49 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.28351
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.28351
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.28351
+ cp -f /host/usr/bin/opensdn-status.tmp.28351 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.28351 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.28351
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:49 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:49 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.24271
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.24271
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.24271
+ cp -f /host/usr/bin/opensdn-tools.tmp.24271 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.24271 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.24271
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:49 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:49 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:49 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:49 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:09:49 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:09:49 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=tcp:1024,udp:1024
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.YbiBrSG5i5
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.YbiBrSG5i5 /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.87lRdlT3d6
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.87lRdlT3d6 /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.5704
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.5704
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.5704
+ cp -f /host/usr/bin/opensdn-status.tmp.5704 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.5704 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.5704
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.4446
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.4446
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.4446
+ cp -f /host/usr/bin/opensdn-tools.tmp.4446 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.4446 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.4446
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.XdhJswLCKX
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.XdhJswLCKX /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.rUwXDKkOCB
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.rUwXDKkOCB /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.26851
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.26851
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.26851
+ cp -f /host/usr/bin/opensdn-status.tmp.26851 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.26851 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.26851
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.24782
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.24782
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.24782
+ cp -f /host/usr/bin/opensdn-tools.tmp.24782 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.24782 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.24782
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:03 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:14 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:14 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.DJiK4R229z
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.DJiK4R229z /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.VZei43y4YX
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.VZei43y4YX /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:14 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:14 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.31478
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.31478
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.31478
+ cp -f /host/usr/bin/opensdn-status.tmp.31478 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.31478 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.31478
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:14 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:14 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.26742
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.26742
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.26742
+ cp -f /host/usr/bin/opensdn-tools.tmp.26742 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.26742 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.26742
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:14 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:14 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:14 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:14 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ date
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ echo 'INFO: =================== Mon Jun  9 02:10:14 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:14 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
++++ echo 10.0.0.22
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ date
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ echo 'INFO: =================== Mon Jun  9 02:10:15 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:15 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ get_default_ip
+++ local server_typ=ZOOKEEPER_NODES
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ true
++ read -r -d '' rabbit_config
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ ANALYTICS_SERVERS=10.0.0.22:8081
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++ cut -c1-50
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.GIniVe7CUN
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.GIniVe7CUN /etc/sysctl.d/60-kernel.core_pattern.conf
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++++ echo 10.0.0.22
++ mktemp -u
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
+ local tmpfile=/tmp/tmp.cC9dOgwY07
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
net.ipv4.tcp_keepalive_intvl = 1
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.cC9dOgwY07 /etc/sysctl.d/60-tf-node-init.conf
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:15 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:15 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.9684
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.9684
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.9684
+ cp -f /host/usr/bin/opensdn-status.tmp.9684 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.9684 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.9684
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:15 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:15 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ grep 'inet '
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.10430
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.10430
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.10430
+ cp -f /host/usr/bin/opensdn-tools.tmp.10430 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.10430 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.10430
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:15 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:15 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
+++ ip addr show dev ens3
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:15 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:15 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:15 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:15 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:50 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:50 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.pnLl5uIKnP
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.pnLl5uIKnP /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.X4VBi4LINL
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.X4VBi4LINL /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:50 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:50 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.4568
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.4568
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.4568
+ cp -f /host/usr/bin/opensdn-status.tmp.4568 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.4568 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.4568
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:50 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:50 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.6948
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.6948
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.6948
+ cp -f /host/usr/bin/opensdn-tools.tmp.6948 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.6948 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.6948
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:50 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:50 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:50 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:50 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:50 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:50 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
+++ cut -d / -f 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:51 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:51 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.4E9iJYGMuT
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.4E9iJYGMuT /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.EUUIiaqv1U
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.EUUIiaqv1U /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:51 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:51 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.16813
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.16813
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.16813
+ cp -f /host/usr/bin/opensdn-status.tmp.16813 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.16813 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.16813
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:51 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:51 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.18279
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.18279
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.18279
+ cp -f /host/usr/bin/opensdn-tools.tmp.18279 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.18279 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.18279
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:51 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:51 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ cut -d / -f 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:51 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:51 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:10:51 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:10:51 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:01 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:01 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ cut -c1-50
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.RCV4YVkyiZ
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.RCV4YVkyiZ /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.7qOgPPkVH0
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.7qOgPPkVH0 /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.6094
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.6094
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.6094
+ cp -f /host/usr/bin/opensdn-status.tmp.6094 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.6094 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.6094
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.5263
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.5263
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.5263
+ cp -f /host/usr/bin/opensdn-tools.tmp.5263 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.5263 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.5263
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.XXiA0e6ZiO
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.XXiA0e6ZiO /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.Aoxa4OQxQV
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.Aoxa4OQxQV /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.32745
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.32745
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.32745
+ cp -f /host/usr/bin/opensdn-status.tmp.32745 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.32745 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.32745
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.9692
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.9692
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.9692
+ cp -f /host/usr/bin/opensdn-tools.tmp.9692 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.9692 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.9692
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ cut -d / -f 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ head -n 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:02 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ cut -c1-50
++ sed 's/[^a-zA-Z0-9_.]/_/g'
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.fIkGjJMiwp
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.fIkGjJMiwp /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.t8YLzb8meo
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.t8YLzb8meo /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.20300
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.20300
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.20300
+ cp -f /host/usr/bin/opensdn-status.tmp.20300 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.20300 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.20300
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.3571
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.3571
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.3571
+ cp -f /host/usr/bin/opensdn-tools.tmp.3571 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.3571 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.3571
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ echo kernel.core_pattern
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.X9K7wK6qAM
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.X9K7wK6qAM /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.yU8XRm2apb
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.yU8XRm2apb /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ head -n 1
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.23871
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.23871
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.23871
+ cp -f /host/usr/bin/opensdn-status.tmp.23871 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.23871 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.23871
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ cut -d / -f 1
+++ head -n 1
+++ ip addr show dev ens3
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ sed s/-status:/-tools:/
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.27004
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.27004
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.27004
+ cp -f /host/usr/bin/opensdn-tools.tmp.27004 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.27004 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.27004
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:17 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:28 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:28 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
++ echo kernel.core_pattern
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.AFPcSA8lBX
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.AFPcSA8lBX /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.y9d5jEV5N1
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.y9d5jEV5N1 /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:28 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:28 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.20854
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.20854
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.20854
+ cp -f /host/usr/bin/opensdn-status.tmp.20854 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.20854 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.20854
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:28 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:28 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 1
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.19472
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.19472
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.19472
+ cp -f /host/usr/bin/opensdn-tools.tmp.19472 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.19472 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.19472
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:28 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:28 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:28 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:28 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ cut -d / -f 1
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:28 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:28 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:29 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:29 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ grep 'inet '
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ set_ctl kernel.core_pattern /var/crashes/core.%e.%p.%h.%t
+ local var=kernel.core_pattern
+ local value=/var/crashes/core.%e.%p.%h.%t
++ echo kernel.core_pattern
++ sed 's/[^a-zA-Z0-9_.]/_/g'
++ cut -c1-50
+ local filename=kernel.core_pattern
+ local file=/etc/sysctl.d/60-kernel.core_pattern.conf
++ mktemp -p /etc/sysctl.d/
+ local tmpfile=/etc/sysctl.d/tmp.UOMsAMSJt4
+ echo kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
+ mv -f /etc/sysctl.d/tmp.UOMsAMSJt4 /etc/sysctl.d/60-kernel.core_pattern.conf
+ sysctl -w kernel.core_pattern=/var/crashes/core.%e.%p.%h.%t
kernel.core_pattern = /var/crashes/core.%e.%p.%h.%t
+ [[ -z '' ]]
+ CONTRAIL_SYSCTL_TUNING=net.ipv4.tcp_keepalive_time=5
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_probes=5'
+ CONTRAIL_SYSCTL_TUNING+=' net.ipv4.tcp_keepalive_intvl=1'
+ CONTRAIL_SYSCTL_TUNING+=' vm.max_map_count=128960'
+ CONTRAIL_SYSCTL_TUNING+=' net.core.wmem_max=9160000'
+ echo 'INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
INFO: apply sysctl: net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000
+ l1='net.ipv4.tcp_keepalive_time=5 net.ipv4.tcp_keepalive_probes=5 net.ipv4.tcp_keepalive_intvl=1 vm.max_map_count=128960 net.core.wmem_max=9160000'
+ l2='net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000'
+ set_sysctls 60-tf-node-init.conf net.ipv4.tcp_keepalive_time 5 net.ipv4.tcp_keepalive_probes 5 net.ipv4.tcp_keepalive_intvl 1 vm.max_map_count 128960 net.core.wmem_max 9160000
+ local target_filename=/etc/sysctl.d/60-tf-node-init.conf
+ shift
++ mktemp -u
+ local tmpfile=/tmp/tmp.sIA40CNQ6j
+ true
+ local var=net.ipv4.tcp_keepalive_time
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_time ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_time=5
+ sysctl -w net.ipv4.tcp_keepalive_time=5
net.ipv4.tcp_keepalive_time = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_probes
+ local value=5
+ '[' -n net.ipv4.tcp_keepalive_probes ']'
+ '[' -n 5 ']'
+ echo net.ipv4.tcp_keepalive_probes=5
+ sysctl -w net.ipv4.tcp_keepalive_probes=5
net.ipv4.tcp_keepalive_probes = 5
+ shift 2
+ true
+ local var=net.ipv4.tcp_keepalive_intvl
+ local value=1
+ '[' -n net.ipv4.tcp_keepalive_intvl ']'
+ '[' -n 1 ']'
+ echo net.ipv4.tcp_keepalive_intvl=1
+ sysctl -w net.ipv4.tcp_keepalive_intvl=1
net.ipv4.tcp_keepalive_intvl = 1
+ shift 2
+ true
+ local var=vm.max_map_count
+ local value=128960
+ '[' -n vm.max_map_count ']'
+ '[' -n 128960 ']'
+ echo vm.max_map_count=128960
+ sysctl -w vm.max_map_count=128960
vm.max_map_count = 128960
+ shift 2
+ true
+ local var=net.core.wmem_max
+ local value=9160000
+ '[' -n net.core.wmem_max ']'
+ '[' -n 9160000 ']'
+ echo net.core.wmem_max=9160000
+ sysctl -w net.core.wmem_max=9160000
net.core.wmem_max = 9160000
+ shift 2
+ true
+ local var=
+ local value=
+ '[' -n '' ']'
+ break
+ mv -f /tmp/tmp.sIA40CNQ6j /etc/sysctl.d/60-tf-node-init.conf
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:29 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:29 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ env_opts='--env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn'
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail/ssl ]]
+ vol_opts+=' -v /etc/contrail/ssl:/etc/contrail/ssl:ro'
+ tmp_file=/host/usr/bin/opensdn-status.tmp.1920
+ cat
+ echo 'INFO: generated opensdn-status (prev: contrail-status)'
INFO: generated opensdn-status (prev: contrail-status)
+ cat /host/usr/bin/opensdn-status.tmp.1920
#!/bin/bash
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    ca_vol_opts=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
    cmd_args="--cacert /etc/contrail/ssl/certs/ca-cert.pem"
  fi
fi
tmp_argv="/root/contrail-status.py $cmd_args $@"
tmp_suffix="--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ${tmp_argv}"

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    $u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn $tmp_suffix
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    r="$u run $ca_vol_opts  -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /var/lib/containers:/var/lib/containers -v /etc/contrail/ssl:/etc/contrail/ssl:ro --env INTROSPECT_SSL_ENABLE=False --env VENDOR_NAME=OpenSDN-IO --env VENDOR_DOMAIN=io.opensdn "
    r+=' -v /run/runc:/run/runc'
    r+=' -v /sys/fs:/sys/fs'
    r+=' -v /etc/containers:/etc/containers:ro'
    r+=' -v /usr/share/containers:/usr/share/containers:ro'
    r+=' --security-opt seccomp=unconfined'
    cmd=$($r $tmp_suffix 2>&1 )
    ret=$?
    if [ $ret == 0 ] ; then
      cmd=$(echo "$cmd" | grep -vi warning)
    fi
    echo "$cmd"
    exit $ret
fi
u=$(which ctr 2>/dev/null)
if (($? == 0)); then
    if ! $u --namespace k8s.io image list | grep -q "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ; then
      $u --namespace k8s.io image pull "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" &>/dev/null
    fi
    r="$u --namespace k8s.io run --rm --privileged --net-host"
    r+=" --env CONTAINERD_NAMESPACE=k8s.io"
    r+=' --mount type=bind,src=/etc/localtime,dst=/etc/localtime,options=rbind:ro'
    r+=' --mount type=bind,src=/etc/hosts,dst=/etc/hosts,options=rbind:ro'
    r+=' --mount type=bind,src=/run/containerd,dst=/run/containerd,options=rbind:rw'
    r+=' --mount type=bind,src=/sys/fs/cgroup,dst=/sys/fs/cgroup,options=rbind:rw'
    $r "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" $RANDOM ${tmp_argv}
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-status.tmp.1920
+ cp -f /host/usr/bin/opensdn-status.tmp.1920 /host/usr/bin/contrail-status
+ cp -f /host/usr/bin/opensdn-status.tmp.1920 /host/usr/bin/opensdn-status
+ rm -f /host/usr/bin/opensdn-status.tmp.1920
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:29 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:29 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ [[ ! -d /host/usr/bin ]]
+ [[ -z "nexus.gz1.opensdn.io:5102/opensdn-status:nightly" ]]
+ vol_opts=
+ vol_opts+=' -v /etc/hosts:/etc/hosts:ro'
+ vol_opts+=' -v /etc/localtime:/etc/localtime:ro'
+ vol_opts+=' -v /var/run:/var/run'
+ vol_opts+=' -v /dev:/dev'
+ vol_opts+=' -v /var/lib/containers:/var/lib/containers'
+ [[ -e /etc/contrail ]]
+ vol_opts+=' -v /etc/contrail:/etc/contrail:ro'
++ echo '"nexus.gz1.opensdn.io:5102/opensdn-status:nightly"'
++ sed s/-status:/-tools:/
+ image='"nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_suffix='--rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"'
+ tmp_file=/host/usr/bin/opensdn-tools.tmp.12817
+ cat
+ echo 'INFO: generated opensdn-tools (prev: contrail-tools)'
INFO: generated opensdn-tools (prev: contrail-tools)
+ cat /host/usr/bin/opensdn-tools.tmp.12817
#!/bin/bash

vol_opts=" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /var/run:/var/run -v /dev:/dev -v /var/lib/containers:/var/lib/containers -v /etc/contrail:/etc/contrail:ro"
if [[ -n "/etc/contrail/ssl/certs/ca-cert.pem" ]] && [[ -e /etc/contrail/ssl/certs/ca-cert.pem ]] ; then
  # In case of FreeIPA CA file is palced in /etc/ipa/ca.crt
  # and should be mounted additionally
  if [[ ! "/etc/contrail/ssl/certs/ca-cert.pem" =~ "/etc/contrail/ssl" ]] ; then
    vol_opts+=" -v /etc/contrail/ssl/certs/ca-cert.pem:/etc/contrail/ssl/certs/ca-cert.pem:ro"
  fi
fi

interactive_key='-i'
[ -t 0 ] && interactive_key+='t'

cont_name="contrail-tools_$(head /dev/urandom | tr -dc a-z0-9 | head -c 13)"

name_opts="--name=$cont_name"

if [[ -n "$@" ]]; then
  entrypoint=$(mktemp)
  echo '#!/bin/bash -e' > $entrypoint
  echo "$@" >> $entrypoint
  chmod a+x $entrypoint
  entrypoint_arg="-v $entrypoint:$entrypoint --entrypoint $entrypoint"
fi

u=$(which docker 2>/dev/null)
if pidof dockerd >/dev/null 2>&1 || pidof dockerd-current >/dev/null 2>&1 ; then
    trap "$u rm -f $cont_name" SIGHUP
    $u run $name_opts $vol_opts $entrypoint_arg $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
u=$(which podman 2>/dev/null)
if (($? == 0)); then
    trap "$u rm -f $cont_name" SIGHUP
    r="$u run $name_opts $vol_opts $entrypoint_arg "
    r+=' --volume=/run/runc:/run/runc'
    r+=' --volume=/sys/fs:/sys/fs'
    r+=' --security-opt seccomp=unconfined'
    $r $interactive_key --rm --pid host --net host --privileged "nexus.gz1.opensdn.io:5102/opensdn-tools:nightly"
    rm -f $entrypoint
    exit $?
fi
+ chmod 755 /host/usr/bin/opensdn-tools.tmp.12817
+ cp -f /host/usr/bin/opensdn-tools.tmp.12817 /host/usr/bin/contrail-tools
+ cp -f /host/usr/bin/opensdn-tools.tmp.12817 /host/usr/bin/opensdn-tools
+ rm -f /host/usr/bin/opensdn-tools.tmp.12817
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:29 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:29 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ awk '{print $2}'
+++++ ip route get 1
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ echo 'INFO: No SSL Parameters Enabled, nothing to do'
INFO: No SSL Parameters Enabled, nothing to do
+ exit 0
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:29 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:29 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ awk '{print $2}'
+++ cut -d / -f 1
+++ grep 'inet '
+++ head -n 1
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ INSTALL_PUPPET=false
+ INSTALL_PUPPET_DIR=/tmp
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+++ date
++ echo 'INFO: =================== Mon Jun  9 02:11:29 UTC 2025 ==================='
INFO: =================== Mon Jun  9 02:11:29 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ awk '{print $2}'
+++ grep 'inet '
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.22
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.22
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.22
++ ANALYTICSDB_NODES=10.0.0.22
++ ANALYTICS_SNMP_NODES=10.0.0.22
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8081 '
+++ '[' -n '10.0.0.22:8081 ' ']'
+++ echo 10.0.0.22:8081
++ ANALYTICS_SERVERS=10.0.0.22:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9042 '
+++ '[' -n '10.0.0.22:9042 ' ']'
+++ echo 10.0.0.22:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.22:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.22
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8086 '
+++ '[' -n '10.0.0.22:8086 ' ']'
+++ echo 10.0.0.22:8086
++ COLLECTOR_SERVERS=10.0.0.22:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.22
++ CONFIGDB_NODES=10.0.0.22
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:8082 '
+++ '[' -n '10.0.0.22:8082 ' ']'
+++ echo 10.0.0.22:8082
++ CONFIG_SERVERS=10.0.0.22:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9161 '
+++ '[' -n '10.0.0.22:9161 ' ']'
+++ echo 10.0.0.22:9161
++ CONFIGDB_SERVERS=10.0.0.22:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9041 '
+++ '[' -n '10.0.0.22:9041 ' ']'
+++ echo 10.0.0.22:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.22:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.22
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.22
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.22
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:2181,
+++ '[' -n 10.0.0.22:2181, ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS=10.0.0.22:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:2181 '
+++ '[' -n '10.0.0.22:2181 ' ']'
+++ echo 10.0.0.22:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.22:2181
++ RABBITMQ_NODES=10.0.0.22
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+=10.0.0.22:5673,
+++ '[' -n 10.0.0.22:5673, ']'
+++ echo 10.0.0.22:5673
++ RABBITMQ_SERVERS=10.0.0.22:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:6379 '
+++ '[' -n '10.0.0.22:6379 ' ']'
+++ echo 10.0.0.22:6379
++ REDIS_SERVERS=10.0.0.22:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.22
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.22
+++ local server_address=10.0.0.22
+++ extended_server_list+='10.0.0.22:9092 '
+++ '[' -n '10.0.0.22:9092 ' ']'
+++ echo 10.0.0.22:9092
++ KAFKA_SERVERS=10.0.0.22:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.22
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.22
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled
+ local val=
+ [[ '' == \t\r\u\e ]]
+ [[ '' == \y\e\s ]]
+ [[ '' == \e\n\a\b\l\e\d ]]
+ exit